summaryrefslogtreecommitdiff
path: root/src/regress/lib/libcrypto (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* Hook up sm3 regress tests.tb2018-11-111-1/+2
|
* Add sm3 regress tests.tb2018-11-112-0/+101
|
* Clean up and free objects at the completion of the regress test.jsing2018-11-101-1/+13
| | | | From Ben L <bobsayshilol at live dot co dot uk>.
* Fix a leak reported by Ben L bobsayshilol () live ! co ! uk.tb2018-11-101-1/+3
|
* fix a leak pointed out by Ben L (bobsayshi () live ! co ! uk)tb2018-11-101-4/+8
|
* The Botan library from ports an be configured to use OpenSSL orbluhm2018-11-092-1/+22
| | | | | | | | LibreSSL as crypto provider. When we run their regression tests, we are actually testing our library. This is far from perfect. A lot of LibreSSL features have not been implemented as Botan provider. Even if provider openssl is specified, botan-test runs a lot of non-openssl tests. This can be improved later.
* Add subdirectires with SUBDIR += instead of a single assignment withtb2018-11-091-47/+46
| | | | line continuations.
* Add missing NULL checks on allocation, style(9) and consistently usejsing2018-11-081-35/+34
| | | | goto err instead of handrolling.
* Add missing BN_free() calls.jsing2018-11-081-1/+3
| | | | From Ben L <bobsayshilol at live dot co dot uk>.
* Use ASN1_TYPE_new()/ASN1_TYPE_free() to avoid leaking memory.jsing2018-11-081-12/+17
| | | | From Ben L <bobsayshilol at live dot co dot uk>.
* Use in-place (un)wrapping in the keywrap tests.tb2018-11-071-5/+8
|
* better failure printing, add more checkstb2018-11-061-9/+35
|
* link rand/ to buildtb2018-11-061-2/+4
|
* add a regression test for bn_rand_interval()tb2018-11-062-0/+98
|
* With the fixed length checks in aes_wrap.c 1.11, we can remove the uglytb2018-10-201-11/+3
| | | | length checks here.
* Run Wycheproof testvectors for AES Key Wrap without padding (RFC 3394)tb2018-10-191-4/+144
| | | | | | against libcrypto. Currently contains caller-side length checks that should really be done in the library. This will be fixed after an upcoming commit to libcrypto.
* truncate long comments in audit summarytb2018-10-191-2/+7
|
* simplify BN_bin2bn() calls; no need to pre-declare the variable.tb2018-10-181-11/+6
|
* Avoid a bad out of bounds access that caused intermittent crashes.tb2018-10-181-2/+2
|
* whitespace cleanup and other minor things from gofmttb2018-10-071-44/+39
|
* make sure all CStrings are freedtb2018-10-061-3/+7
|
* plug a memory leaktb2018-10-061-1/+2
|
* wrap a few more overlong linestb2018-10-061-14/+36
|
* wrap some overlong fmt.Printfstb2018-10-061-53/+106
|
* It's slightly simpler to get the ECDH public key as an EC_POINT by usingtb2018-10-061-16/+15
| | | | | EC_KEY_set_public_key_affine_coordinates() and EC_KEY_get0_public_key() than using EC_POINT_set_affine_coordinates_GFp() directly.
* free EC_POINT and EC_GROUPtb2018-10-061-1/+4
|
* Run Wycheproof ECDH Web Crypto test vectors against libcrypto.tb2018-10-061-6/+155
|
* merge runECDSAWebCryptoTest() into runECDSATest()tb2018-10-061-53/+31
|
* factor ECDSA signature extraction into its own functiontb2018-10-061-24/+35
|
* make allocate/use/defer dances more consistent in ECDSA sig extractiontb2018-10-061-9/+8
|
* Run Wycheproof ECDSA Web Crypto test vectors against libcrypto.tb2018-10-051-7/+166
|
* Better refer to RFC 8422 which obsoletes RFC 4492.tb2018-10-041-2/+2
|
* While we don't explicitly support curve secp256r1, we can run 1250 teststb2018-10-041-11/+2
| | | | against its ANSI equivalent prime256v1 (compare RFC 4492, Appendix A).
* in ECDH, gather statistics where it makes more sensetb2018-09-301-8/+5
|
* Add a comment on the acceptable RSASSA cases.tb2018-09-221-2/+3
|
* gather statistics in checkAead{Open,Seal}() as well.tb2018-09-221-1/+7
|
* remove some unneeded checkstb2018-09-221-15/+5
|
* gather and print some statistics on the acceptable cases we need totb2018-09-221-8/+60
| | | | look into
* more flags printingtb2018-09-221-23/+23
|
* improve logic involving acceptableAudittb2018-09-221-5/+5
|
* Swap order of "action" and "wt.Flags" in a few fmt.Printfs.tb2018-09-221-17/+17
|
* Introduce a couple of convenience targets to help with auditing thetb2018-09-222-5/+41
| | | | acceptable cases.
* Print the flags field in INFO: and FAIL: messages. It's helpful intb2018-09-211-17/+17
| | | | identifying the important failures while auditing.
* fix order of arguments in fmt.Printf()tb2018-09-181-2/+2
|
* add missing default case to switchtb2018-09-161-1/+3
|
* EVP_aead_chacha20_poly1305() can't actually fail.tb2018-09-161-4/+1
|
* Rename *AesCcmOrGcm* into the slightly less ugly *AesAead*.tb2018-09-161-9/+9
|
* another typo. time to sleeptb2018-09-151-2/+2
|
* typostb2018-09-151-3/+3
|
* add a brief comment on the acceptable AES CCM and AES GCM casestb2018-09-151-2/+8
|